© 2019 - estasir
They both have had very serious similar issues in the very recent past. To start with, that has affected at least a thousand different home and small office Linksys routers, including the E1000, the E1200, and the E2400.
Johannes Ullrich of the Sans Institute described the depth of the issue in, which detailed the worm’s method of attack, and the ways in which the worm self-replicates by taking advantage of code-execution vulnerability in the device’s original firmware. Then there was an: only a few days after the Linksys exploit revelation, a researcher named Kyle Lovett publicly exposed a major vulnerability in a number of heavy duty Asus routers and their faulty firmwares. In fact, the image above is of an anonymous message that reached at least one Asus user with this very same firmware vulnerability, warning users that the exploit leaves them open to hacking by “anyone in the world with an internet connection.” Lovett was only moved to publish the exploit after he privately contacted Asus with the information. The router company dismissed the problem as “not an issue”, a dismissal with which Lovett evidently disagreed. According to Ars Technica, potentially affected routers include the “RT-AC66R, RT-AC66U, RT-N66R, RT-N66U, RT-AC56U, RT-N56R, RT-N56U, RT-N14U, RT-N16, and RT-N16R.” DD-WRT & Tomato Linksys/Asus Routers Security Fixes. Asus RT-AC66U Upgraded Features These particular stories made us sit up and take notice, because there are a few routers listed as vulnerable that are included in our line, such as the, the and the.